Security Architect, IT Average Salary

Job Satisfaction

We have no job satisfaction data for this job. Do you work as Security Architect, IT ? Start the survey
national salary data
National Employer Data
There is not enough data available to display this chart. Is this your job? Help us build our database by providing information about this job title. Start here.

Security Architect, IT Job Listings

Search for more jobs:

Job Description for Security Architect, IT

An information technology (IT) security architect is responsible for the network and computer security for their company. At the early stages of the security life cycle, the security architect acts as a project leader to plan, research, and design elements of security. The security architect starts by creating a general design, planning intended features and functionality. Then, the security architect delegates tasks to members of an assigned programming team to develop the modules necessary for the final security structure. After the pieces have been created, the security architect integrates the security modules and begins testing the final security structure to ensure it behaves as intended. The IT security architect then develops the company policies and procedures for how their company's employees will use the security systems. After researching possible authentication protocols, the security architect selects a scheme to use and implements the selected protocols.

The IT security architect also responds to any tickets or problem reports for the system. Further, in the event that there is a security incident, the security architect performs a post-event analysis to determine how robust the system is and develop any necessary changes. Security architects tend to work full time in a general office environment.

A bachelor's degree in computer security, computer science, or a related field is generally required for this position. Previous experience in a related field may be required as well.
Security Architect, IT Tasks
  • Research, design, and oversee implementation of information technology, systems, and policies for information security in support of business needs.

Key Stats

1-4 years
5-9 years
10-19 years

Find Out Exactly What You Should Be Paid

United States (change)

Employers: Start Here »

Subscribe to Our Newsletter

Salary and career advice to put you a step ahead.
newsletter icon


Get Career Tips & Advice

Want to Get More Specific? Get a Salary Report Customized for YOU

Tell us about your current job and your skillset, and we’ll let you know how much employers are paying in your area.

PayScale Research